Page 126 - 2023-Vol19-Issue2
P. 126

122 |                                                                                                                             Rashid et al.

                                                                • The fast authentication of PDi is confirmed as below:

                                                                                  ''  =  h(PW Pi||          ShPDi ||  R'A)

                                                                        PW Pi

                                                                                      = h(PW Pi|| ShPDi || g VA' )

       Fig. 3. Login and authentication phases

• The body temperature sensor has the ability to obtain                               = h(PW Pi|| ShPDi ||RA)
  the temperature of the patient and redirects the values
  to the PDi based on the following conditions:                                                      '

      – Normal: If the value of the temperature signal >=                             = PW Pi
         36.5 and the temperature signal <= 37.2, the case
         of the patient is normal, and then the result is sent  The     left  side    (PW        '  )   is  matched   with  the   right   side    in
         to PDi every 12 hours while the normal case is
         continuous [8].                                                                      Pi

      – Abnormal: If the value of the temperature signal        the above proof. Therefore, the authentication phase is
         is greater than 37.2, this result is sent to PDi di-
         rectly. PDi observes the reaction of Pi and his        verified from PDi to AS.
         detailing with the warning message via PDi. If
         the interaction of Pi is negative, PDi submits the     • Providing Key Agreement and Key Freshness: The key
         medical information of Pi to AS for the necessary
         action to be taken. Then, AS retrieves the phone         agreement depends on main components and secure pa-
         numbers of the doctors and relatives of the patient
         to tell them about their emergency.                      rameters <Si , PDi , AS , ShSi , ShPDi > in the proposed
                                                                  scheme. The first one is connected with Si and PDi,
• Finally, (PDi) sends a medical report of the patient to         where the secret key is ShSi . The second fold depends
  AS at the end of the day. This report is saved in the           on ShPDi used by components PDi and AS, and ShPDi
  database of AS to be used by doctors or authors in the          is generated once for each login request. The following
  future.
                                                                  steps illustrate the mechanism of generating a key:

                                                                    – PDi generates an integer random number RA < q
                                                                       and computes VA = gRA mod q.

                                                                    – PDi sends EPDi = EncShPDi (VA) to AS.

                                                                    – AS generates an integer random number RB <
                                                                                                                                          '
                                                                        q  and        computes          VB  = gRB     mod   q  and   E     PDi    =

              IV. FORMAL ANALYSIS                                       E ncShPDi     (VB).         Then,   it  sends  <E   '     >  to   AS.
                                                                                                                             PDi
A. Security Analysis
This work can enjoy several security features as follows.           – PDi computes ShPDi = ShPDi (V ' B * RA).

    Correctness                                                     – AS computes ShPDi = ShPDi (VA' * RB). Conse-

                                                                        quently, the proposed scheme supports key fresh-

                                                                        ness for each login session.

• The fast authentication of Si is proven below:                • Providing Anonymity and Untraceability: Assume the

      – PW 'Si is calculated based on decrypted ESi to ob-      attacker (A˜ ) can capture the important parameters such
         tain ri via secret key ShSi , so the password process                        Pi'
         of a sensor Si is correct:                             as  PW  '     ,  PW           in  the   communication       channel  between
                                                                         Si
      –
                                                                components. On the side of Si, employing the random
                                                                                                                                     '
                                                                ri  in  the   login   message               demand   <  IDSi,  PW     Si  ,  ESi  >

                                                                refers to the generation of the message one time for

       PW ''Si  =  h (PW Si ,  ri)  =  PW  '                    each demand. ? faces difficulties to obtain (ri) from
                                            Si
                                                                ESi .

– As a result, the authentication phase is proven               On the other side, A˜ fails to trace or obtain a one-time
   correct from Si to PDi.                                                                 '
                                                                password                      between PDi       and AS.        In each login
                                                                                 PW Pi
   121   122   123   124   125   126   127   128   129   130   131